Sciweavers

5065 search results - page 966 / 1013
» Neural networks: Algorithms and applications
Sort
View
DASFAA
2010
IEEE
148views Database» more  DASFAA 2010»
14 years 1 months ago
Competitive Privacy: Secure Analysis on Integrated Sequence Data
Sequence data analysis has been extensively studied in the literature. However, most previous work focuses on analyzing sequence data from a single source or party. In many applica...
Raymond Chi-Wing Wong, Eric Lo
ACSAC
1999
IEEE
14 years 1 months ago
A Middleware Approach to Asynchronous and Backward Compatible Detection and Prevention of ARP Cache Poisoning
This paper discusses the Address Resolution Protocol (ARP) and the problem of ARP cache poisoning. ARP cache poisoning is the malicious act, by a host in a LAN, of introducing a s...
Mahesh V. Tripunitara, Partha Dutta
WETICE
1998
IEEE
14 years 1 months ago
Efficient Security for Large and Dynamic Multicast Groups
Proposals for multicast security that have been published so far are complex, often require trust in network components or are inefficient. In this paper we propose a series of no...
Germano Caronni, Marcel Waldvogel, Dan Sun, Bernha...
ECCV
2010
Springer
14 years 1 months ago
Lighting and Pose Robust Face Sketch Synthesis
Automatic face sketch synthesis has important applications in law enforcement and digital entertainment. Although great progress has been made in recent years, previous methods onl...
CSCLP
2006
Springer
14 years 17 days ago
Efficient Recognition of Acyclic Clustered Constraint Satisfaction Problems
Abstract. In this paper we present a novel approach to solving Constraint Satisfaction Problems whose constraint graphs are highly clustered and the graph of clusters is close to b...
Igor Razgon, Barry O'Sullivan